Network Design for LUMCAT Ltd.: A Comprehensive Report

Verified

Added on  2025/05/03

|19
|3115
|422
AI Summary
Desklib provides solved assignments and past papers to help students succeed.
Document Page
Networking
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Contents
Introduction......................................................................................................................................3
LO1 Examine networking principles and their protocols................................................................4
P1 Discuss the benefits and constraints of different network types and standards.....................4
P2 Explain the impact of network topology, communication and bandwidth requirements.......6
LO2 Explain networking devices and operations............................................................................7
P3 Discuss the operating principles of networking devices and server types.............................7
P4 Discuss the inter-dependence of workstation hardware with relevant networking software. 8
LO3 Design efficient networked systems......................................................................................10
P5 Design a networked system to meet a given specification...................................................10
P6 Test and evaluate the design to meet the requirements and analyse user feedback.............10
LO4 Implement and diagnose networked systems........................................................................14
P7 Implement a networked system based on a prepared design................................................14
P8 Document and analyse test results against expected results.................................................16
Conclusion.....................................................................................................................................18
List of Figures
Figure 1: Network Types.................................................................................................................4
Figure 2: Network Design\............................................................................................................10
Figure 3: PC form HR pinging to PC at Design............................................................................14
Figure 4: Telnet the router of our network....................................................................................15
Figure 5: Correct Password...........................................................................................................16
Document Page
Introduction
The following report contains a detailed explanation and guidelines to set up the network
architecture of LUMCAT Ltd. It has 3 departments, which are HR, Design, sales. Now a new
department as R&D is being added to the company’s departments. There are also three servers
like Web, Email and DNS respectively. We have to set up a network system so that these
department employees could communicate with each other on the same channel.
Document Page
LO1 Examine networking principles and their protocols
P1 Discuss the benefits and constraints of different network types and standards.
Network Protocols & Its types
Network Protocols are a set of rules governing network-to-network communication among
computers and other network devices.
Network Protocol rules include procedures that control a network's following characteristics:
data transmission speed, access method, possible physical arrangements and distinct cabling
methods
Some of those basic protocols are: Token Ring, Ethernet, FDDI, ATM, Fast Ethernet Local Talk
The images below depict some of the basic network symbols widely used to describe the
network protocols.
Figure 1: Network Types
Token Ring
IBM created the Token Ring protocol during mid-1980s. Its method of access is Token-passing.
Computers are joined as they are forming a logical ring-like structure. Hence the signal moves in
a ring structure in Token Ring from one computer to another. If an unwanted token arrives at any
computer, then it simply transfers that token to the next computer. The token keep moving inside
the ring until it arrives at the PC for which the data-packet is proposed. This needs a topology
termed as star-wired ring created by means of fiber optical cable otherwise a twisted pair cable.
Its transmission speed can range from 4 Mbps to 16 Mbps (Balador, 2016).
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Ethernet
The most deployed protocol in network is probably Ethernet. It customs access technique named
(CSMA / CD). In this system, each computer, before transmitting anything through the network,
listens to the cable. The computer will only send the data if the network is free and clear. If there
is no clear line for transmission, then the computer will hold its data and as soon as the line
becomes clear, it transmits it. Two computers or nodes sometimes try to transfer at the same or
equivalent interval of time. This results in collision and then for again becoming capable of
transmitting they have to wait for a fixed time of time period. These collisions are normal in
Ethernet. The delay occurred due to collisions and retransmission; however, is quite less &
normally doesn’t disturb the network's transmission speed. Ethernet protocol enables usage of
linear topologies like tree, star or bus. Data can be sent and received via, fiber optic cable,
Wireless APs, twisted pair cables.
FDDI
It is also a system protocol mainly castoff to associate two or more LAN (Local area networks)
which may be present at long distances. Its access technique is token-passing. The physical
topology for FDDI is a dual ring-like structure. Transfer normally takes place on one ring;
however, when a break befalls, the system circulates the information by using part of the second
ring and then automatically to create another new complete ring. It offers a High-speed
transmission medium like around 100 Mbps if fiber cable is used (Planning, 2018).
Fast Ethernet
For improved and more transmission speed, a new standard that can support speed up to 100
Mbps has been created by the Ethernet protocol which is termed as Fast Ethernet. It functions
on some of other, unlike network concentrators that are more expensive. Also, for wiring and
physical connections, fiber optic cable CAT5 are needed. Appropriate to use into newly wired
schools (Dolezilek, 2016).
ATM
ATM stands for Asynchronous Transfer Mode. It is network procedure that can provide data
transmission speed of 155 Mbps or some time extra than this. In ATM protocol, complete data is
Document Page
segmented into small packets and then transmitted, which is contrary to other protocols which
transmit the variable size or length. It can provide support for various media like imagery, video
and audio quality CD. It uses star topology that could support both twisted pair cables and fiber
optics. Most used to connect two or more LAN. ISP uses it to deliver high-speed Internet service
for their clients.
Local Talk
It uses (CSMA / CA). The difference between CSMA /CD and CSMA/CA is that before actually
transmitting, the latter indicates or gives signals that it is about to transmit any data. To connect
up the Local Talk adapters, an unusual twisted pair cable is used to connect up the serial ports of
the computers. The Macintosh OS is capable of setting up a peer-to-peer network avoiding
necessity for any other software. And then if we want to arrange a client / server net in
Macintosh, then we can do it by adding up the server version of AppleShare software.
Possible topologies for Local Talk are star, tree or bus topologies. Although, Local Talk protocol
has the disadvantage of having a transmission speed of only around 240 Kbps (Booth, 2017).
P2 Explain the impact of network topology, communication and bandwidth
requirements.
Document Page
LO2 Explain networking devices and operations
P3 Discuss the operating principles of networking devices and server types.
Hub–It is essentially a repeater for multiports. A connector or central device in a Star topology
could be an example to describe the position of a HUB. Hubs don’t filter data. Hence all
connected devices will receive data packets. In other words, the collision domain in HUB for all
the devices is just one. They also have no mechanism for finding out the best path for data
packets.
Hubs could be further categorized as
Active Hub: These kinds of Hubs have their personal power supply and are able to change the
characteristics of the network signal. It could be used as both a cable centre and a data centre.
When the node distance is needed to be extended, we introduce these hubs into our network.
Passive Hub: These kinds of hubs collect node cable and active hub power supply. These hubs
are not helpful when network extension is to be done and also they don’t have any feature of
boosting or cleaning the network signal (Eliyahu, 2016).
1. Routers–the device which uses IP addresses to route data packets on their specific
destinations is known as Router. It is primarily a device for the Network Layer. Routers
normally connect WAN and LAN together and have a routing table that is dynamically
updated to make choices about routing data packets. Router divides transmission areas from
linked nodes.
2. Switch-It is described as a multi-port bridge with a layout that can increase its productivity
and memory or buffer for storing instructions and small chunks of data. Switch is the device
for the data link layer. Before transmitting data, Switch does an error check making it smooth
as the error checking will lead to error-free transmission of right packets to the correct
interface. Every host remains in the same broadcast domain or network, but the collision
domains for every port is divided per port.
3. Bridge–A bridge runs on layer 2 (OSI model; data link layer). It is a repeater with a feature
of content filtering by viewing the origin and target MAC addresses. It could also connect
two LANs that work on the same protocol. For input and output, it has a same single port.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Transparent Bridges: These are the structure in which the adjoining stations do not know of the
bridge or in other words bridge presence which means either a bridge is inserted or removed
from the network it will not affect the communication between the two networks. Processes run
under these bridges are bridge learning and bridge forwarding.
Source Routing Bridges: Routing procedure is carried out by source in these bridges and the
frame defines the path to be followed.
Adding Servers into Network
Servers: It is a machine that provides different facilities with a specific collection of rules and
programs. Together, a server and its customers create a client / server model that offers an
integrated service to access any information or data. It can be considered as an alternative
technology for serving documents, information, fax materials, and various PCs. A file server, for
instance, is a computer that holds documents and enables network hosts and users to upload and
download documents from it. Clients or users of the servers could primarily be PCs, printers,
faxes and other equipment. With the use of server, resources such as printers and fax machines
can be securely shared. Employees can, therefore, access the Internet or business e-mail
concurrently with a server network (Rubin, 2016).
P4 Discuss the inter-dependence of workstation hardware with relevant networking
software
A combination of hardware and software which works as an engine for running the server is
known as a Server platform.
Different servers
a. Audio/Video Servers: Audio / video servers provide websites features of multimedia by
streaming. Streaming is an information transfer method that can be described as a constant
and nonstop flow. Streaming techniques are becoming more and more essential to make a
user capable of downloading big multimedia files. It also enables us to view the data before
the full document or data is transferred.
Document Page
b. Chat Servers: These servers allow customers to exchange data in a newsgroup environment
over internet medium that offers real-time chat abilities. Real-time implies that an immediate
response will occur. Most general-purpose OS is not real-time, as they may take some
seconds or even minutes to respond.
c. FTP Servers: Said to be one of the earliest Internet facilities, the FTP protocol enables one or
more documents to be moved safely between PCs. It also offers the safety and arrangement
of documents along with a controlled transfer.
d. List Servers: List Servers List servers provide a manner to handle mailing lists, whether they
are open-to-public interactive debates or one-way publicity lists.
e. Proxy Servers: Proxy servers are typically located between a web browser and an outside
server which could be different web server on internet. It filters applications, requests or
queries, enhances efficiency, and maintain links.
f. Telnet Servers: It allows clients to access into a host machine and execute functions as
though they are happening the distant machine itself.
g. Web Servers: It delivers a web browser through its static and dynamic material by booting
and then loading a document from its storage disk and supplying it towards web browser
associated with user throughout network. The whole exchange is medalled by the client and
server communicate with each other with HTTP language and protocols (Pierce, 2015).
Document Page
LO3 Design efficient networked systems
P5 Design a networked system to meet a given specification
Network Design
Figure 2: Network Design\
P6 Test and evaluate the design to meet the requirements and analyse user
feedback.
Installation and configuration of hardware and services
Step by step building of this network design (in packet tracer and real also)
1. First, we need to decide the devices which are to be used according to our requirements. As
we can see that the main devices in the design are: router, switch, PCs and servers.
2. Now we can take any vendor specific devices according to our need and budget. Cisco packet
tracer design has cisco devices.
3. Then we will place the devices into their respective places according to the departments.
Every department has different no of required devices.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
4. After arranging the devices next, we have to do is to make physical connections between
these devices. We are using straight and cross twisted pair cables.
Now we have to set up the router and switch
a. Router
I. On router, first, we will give the IP address. As asked, we have to use network
192.168.10.0/24 for our network. So the configurations look like this:
II. Next, we will create a DHCP server on router itself so that the hosts on the network could
be assigned an IP address through dynamic mode.
Lease infinite command given here determines that for how much time an IP Address
from the pool “project” will be assigned on any host. As we have set it to “infinite”, it
will be set for an infinite period of time.
“default router” command sets the default gateway address for the hosts of that network.
Document Page
III. Then we will set a login password for accessing the Router console. It is very important
as missing it can lead to unauthorized access to the device and hence network.
enable password project
Nowwith this command whenever we will log in to router CLI, it will prompt us for the
password.
IV. Telnet: telnet allows the remote connection to the network devices through VTY lines or
virtual terminal lines.
These are some of the necessary configurations to be done on the router.
b. Switch
I. Setting up Port-security:
Port- security feature enables us to have an authentication on our switch ports. We can set
multiple parameters like Valid no of mac address allowed, action on violation and mac address
learning technique on a switchport. This feature is very important to apply.
chevron_up_icon
1 out of 19
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]